Software Contract Solutions

How Cisco’s newest security tool can detect malware in encrypted traffic

Cisco’s Encrypted Traffic Analytics (ETA), which monitors network packet metadata to detect malicious traffic even if its encrypted, is now generally available. Cisco’s Encrypted Traffic Analytics (ETA), a software platform that monitors network packet metadata to detect malicious traffic, even if its encrypted, is now generally available. The company initially launched ETA in June, 2017 … Read more

California set to lose most money to cybercrime in 2018

New study compares FBI Internet Crime data with insurance stats to reveal the states most at risk from cybercrime. New research by Website Builder Expert, the online resource for creating and launching a website, has revealed the states which are set to lose the most money to cybercrime in 2018. The study compares data from the FBI’s … Read more

Full Disclosure Applies to Internal Security Too

internal security

If you’ve been keeping up with the news, you’ve probably noticed a few recent reports about companies that may have been a little less than candid about security issues. For example, we recently learned that Uber experienced a breach in 2016. As we’ve also learned from subsequent press reports, the company may have paid the … Read more

Cyber security predictions from CUJO AI

The issue of cyber security has been thrust into the spotlight this year like never before, with overwhelming attacks gaining international coverage. Evolving & ever growing IoT landscape will widen attack surface for cyber criminals (IoT adoption by corporations, smart homes). It has been predicted that there will be more than 20 billion IoT devices … Read more

Ransomware of IoT will become a new security nightmare in 2018

2018 could be the year that governments take a more active role in IoT security, and put pressure on device manufacturers to do the right thing for consumers. 2017 will likely be remembered as the year of ransomware, with high-profile attacks by WannaCry and NotPetya dominating the headlines and causing widespread disruption to organisations around … Read more

Tackling security with container deployments

container deployment security

The most effective and proactive way of controlling that security risk is by finding and removing vulnerabilities in base images. Containers provide an effective way to deliver a compact, portable environment for running applications across shared server resources. But enterprises are advised to take precautions before embracing this approach to operating-system-level virtualization. Security risks unique … Read more

5 information security threats that will dominate 2018

cybersecurity trends 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats. If you thought 2017 was a dire year for data breaches, wait until 2018. The Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and … Read more

5 cyber security trends for 2018

cyber security

McAfee forecasts developments in adversarial machine learning, ransomware, serverless apps, connected home privacy and privacy of child-generated content. McAfee Inc.’s most recent threat analyst report has identified five key cyber security trends to watch in 2018. This year’s report focuses on the evolution of ransomware from traditional to new applications, the cyber security implications of … Read more

How to Tailor Security Awareness Training to Employees’ Needs

security awareness

Are you concerned with the cyber security of your company? Mitigate risks by training your employees. Here’s how: Security awareness isn’t just education, communications and training. It is cultural change and a movement that requires buy in from the top down and the bottom up. It needs to be a credible program that people want … Read more

More Industrial Products at Risk of KRACK Attacks

KRACK attacks on industrial products

Using industrial products from Cisco, Siemens, Rockwell Automation or Sierra Wireless? Then this article is a must-read for you. An increasing number of vendors have warned customers over the past weeks that their industrial networking products are vulnerable to the recently disclosed Wi-Fi attack method known as KRACK. The KRACK (Key Reinstallation Attack) flaws affect the WPA … Read more